Follow
Sam L. Thomas
Sam L. Thomas
Chief Scientist, BINARLY, Inc.
Verified email at binarly.io - Homepage
Title
Cited by
Cited by
Year
HumIDIFy: a tool for hidden functionality detection in firmware
SL Thomas, FD Garcia, T Chothia
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
482017
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality
SL Thomas, T Chothia, FD Garcia
European Symposium on Research in Computer Security, 513-531, 2017
392017
Backdoors: Definition, Deniability and Detection
SL Thomas, A Francillon
Proceedings of the 21st International Symposium on Research in Attacks …, 2018
332018
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning
C McMahon Stone, SL Thomas, M Vanhoef, J Henderson, N Bailluet, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
142022
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
Z Chen, SL Thomas, FD Garcia
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Cutting Through the Complexity of Reverse Engineering Embedded Devices
SL Thomas, J Van den Herrewegen, G Vasilakis, Z Chen, M Ordean, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 360-389, 2021
82021
Backdoor Detection Systems for Embedded Devices
SL Thomas
University of Birmingham, 2018
82018
Finding software bugs in embedded devices
A Francillon, SL Thomas, A Costin
Security of Ubiquitous Computing Systems: Selected Topics, 183-197, 2021
52021
Organising monkeys or How to run a hacking club
AI Radu, SL Thomas
Workshop on Cybersecurity Training & Education (VIBRANT15), 2015
52015
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware—Supplementary Material
Z Chen, SL Thomas, FD Garcia
The system can't perform the operation now. Try again later.
Articles 1–10